GPG Agent tries to prevent brute forcing the passphrase. However, it doesn't
rate limit pinentry. If an incorrect passphrase is entered, gpg agent should
sleep for 100ms before replying to pinentry thereby limiting the rate to 10
tries per second without noticeably impacting the user interaction. See issue
2034 for details.
Description
Description
Status | Assigned | Task | ||
---|---|---|---|---|
Resolved | neal | T2034 pinentry emacs features need documentation | ||
Resolved | • werner | T2059 Rate limit password attempts by pinentry. |
Event Timeline
Comment Actions
Is that okay or are concerned about keys with passphrsses generated on slower
boxes - they would indeed be checked faster than 100ms. Using gpg --passwd for
such keys adjusts the iteration count so that they will again be delayed by
about 100ms.